,

Enabling SSO to On-Prem Resources for Entra-Only Devices Using Cloud Kerberos Trust

Enabling SSO to On-Prem Resources for Entra-Only Devices Using Cloud Kerberos Trust

In modern environments where devices are joined only to Microsoft Entra ID, enabling seamless access to on-premises resources like file shares or legacy applications can be a challenge. This blog post walks through how to configure Cloud Kerberos Trust to enable Single Sign-On (SSO) for Entra-only joined devices—without requiring a hybrid join or certificate-based trust.

🧰 Prerequisites

  • Microsoft Entra ID P1 or P2 license
  • Entra Only Joined device
  • Windows 10/11 Enterprise or Education
  • Domain Controllers running Windows Server 2016 or later
  • Microsoft Entra Connect installed
  • Intune (for Hello for Business policy deployment)

🖥️ Step 1: Prepare the Entra Connect Server

Run the following on your Entra Connect server to ensure TLS 1.2 is enabled and install the required PowerShell module:

# Ensure TLS 1.2 for PowerShell gallery access
[Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12

# Install the AzureADHybridAuthenticationManagement PowerShell module
Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber

🛠️ Step 2: Configure the Cloud Kerberos Trust

Now configure the Kerberos Server object in your on-prem Active Directory and publish it to Entra ID:

# Define your on-prem domain
$domain = $env:USERDNSDOMAIN

# UPN of a Hybrid Identity Administrator
$userPrincipalName = "administrator@contoso.onmicrosoft.com"

# Domain Admin credentials
$domainCred = Get-Credential

# Create and publish the Kerberos Server object
Set-AzureADKerberosServer -Domain $domain -UserPrincipalName $userPrincipalName -DomainCredential $domainCred

This command creates a Kerberos Server object in your on-prem AD and syncs it to Entra ID, enabling Kerberos authentication for Entra-only devices:

📋 Step 3: Deploy the Cloud Trust Policy via Intune

Use the Settings Catalog in Intune to configure the Windows Hello for Business policy:

  1. Go to Endpoint Manager Admin Center → Devices → Configuration profiles
  2. Create a new profile:
    • Platform: Windows 10 and later
    • Profile type: Settings catalog
  3. Add the following settings:
    • Use cloud trust for on-premises authentication → Enabled
    • Configure Windows Hello for Business → Enabled
    • Use biometrics → Enabled (optional)
    • PIN complexity → as per your policy

This ensures that Entra-only devices can use Windows Hello for Business with Cloud Kerberos Trust to authenticate to on-prem resources.

Summary

With Cloud Kerberos Trust, you can:

  • Eliminate the need for hybrid join or certificate-based trust
  • Enable seamless SSO to on-prem resources
  • Simplify your infrastructure and reduce dependency on ADFS or PKI

Leave a Reply

Your email address will not be published. Required fields are marked *